Science topic
Information Security - Science topic
Explore the latest questions and answers in Information Security, and find Information Security experts.
Questions related to Information Security
Where can I get Latex template for the Springer Journal: International Journal of Information Security? https://www.springer.com/journal/10207
It should be a double-column template.
How do you think artificial intelligence can improve cybersecurity?
What are the risks and benefits?
Respected Researchers/Experts,
With respect to Information Security of Cloud Computing, some of the futuristic research topics on the Cloud security listing below. I request you to share your opinion on the necessity of such research, areas more to focus for the best outcome of such research etc..on following:
1. A full fledged End to End Security Framework for Cloud Computing
2. Forensics architecture for Cloud Delivery models
Please guide me on how can I find a topic for my thesis and where to start work.
How can we differentiate between "Information Security" and "System Security"? Please explain with some solid examples.
Hello all,
I am working on Information Security and looking for some journal to be part of reviewer pane to review papers , article etc. Can someone provide me detail where I can apply to become a Journal reviewer.
Best Regards
Azhar
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a specific action, such as created information, approved information or sent or received a message.
Social media platforms such as WhatsApp have a function which allows one to send a message to an individual or a group and DELETE the message from all the recipients leaving them with no evidence of what has been sent. This allows the sender to deny having sent such a message. Read-once messages which get destroyed upon being read can also be a breach of non-repudiation on Social Media platforms.
What is your view of these functions on social media platforms? Legally are they acceptable?
Hi everyone
I need new ideas for a Ph.D. Degree in Cybersecurity.
Thank you in advance
Humans represent a mystery to be deciphered by security/cybersecurity experts because their behaviors, attitudes, beliefs, rituals and decisions (the general characteristics that define a culture) constitute a little-understood universe for executives and their heads of security. Frequently cited in various international research projects and reports is the fact that people are the weakest links in the security chain. Time and again, it is determined that, despite all the technical efforts and security procedures, people are highly likely to expose organizations to vulnerabilities.
source:
The Human Factor in Information Security (isaca.org)
“Chain” is defined here as the sequence of connected links that enables a system to function. Its strength is defined in terms of the connection that is least strong.
Dreyer, P.; T. Jones; K. Klima; J. Oberholtzer; A. Strong; J. Welburn; Z. Winkelman; “Estimating the Global Cost of Cyber Risk: Methodology and Examples,” Rand Corporation, 2018, https://www.rand.org/pubs/research_reports/RR2299.html
Dear all,
As part of my current research, I would like to have your valuable opinion on the Factors affecting objectivity and effectiveness of Information Security/IT Audit.
Papers and references are welcomed.
Thank you.
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)

According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
I wanted to work on these three topics please suggest me
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
The ethics of Artificial Intelligence (AI)
There are many discussions about ethics of AI and core principles to keep AI ethical. For you as scientist and researcher, what are key principles to keep AI ethical?
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work undertaken under the auspices of the United Nations, namely under the General Assembly, is progressing at a very slow pace. I recently published a research article on that ongoing work at the UN in the field of cybersecurity, available at : . It confirms that progress is slow, so this raises a few questions. What is needed to improve multilateral cooperation on cybersecurity? Are there some specific topics of cybersecurity that should be prioritized in the multilateral arenas? What format (binding, non-binding, information sharing, confidence-building) should the expected deliverables have?
I've just graduated in Computer Science. I would like to start a research about networking/network security/information security fields. Can anyone give me some unsolved problems of above areas to start my research?
In reading various articles and in even discussions with consultants, the terms Cyber Security and Information Security are used interchangeably and sometimes the former seems to be taking over the latter. I want to share my thoughts on this and to show how there can be a distinction between Cyber Risks and Information Security Risks and also show how these two risks can be defined.
Cyber Risks
All risks that affects the organization’s Information Systems such as breaches, IT related threats (Ransomware, virus, malware, etc.). This requires that the relevant People, Process & Technology are in place to predict, prevent, detect and respond against cyber threats.
Information Security (IS) Risks
With IS Risk the focus is on the tenets of Information Security, these are the controls which are to be designed in all IT solutions prior to go live:
Confidentiality – Controls in place to mitigate against the unauthorized disclosure of information.
Integrity – Controls in place to mitigate against the unauthorized modification of information.
Availability – Controls in place to mitigate against downtime of Information Systems, such as Denial Of Service attacks.
So Cyber Risks would relate more to the daily IT related activities of an organization and the Information Security Risks would be the controls that are baked in to IT solutions during the development phase.
Dear all
Based on Research perspectives, what is the differences between Network Security vs Information Security
A need for Data Protection Officers is emerging very fast. After adoption of GDPR, organizations worldwide need hundreds of thousands of DPOs. Are universities ready, are there enough data privacy programs/courses that putts together information security and law?
Do you think Data Protection Officer should be a lawyer or an infosec expert? Since it is very hard to get 2 in 1 in one person, do you thing that DPO should be a team of at least two people?
GDPR says:
The data protection officer shall be designated on the basis of professional qualities and, in particular, expert knowledge of data protection law and practices and the ability to fulfil the tasks referred to in Article 39.
Article 39
Tasks of the data protection officer
1. The data protection officer shall have at least the following tasks:
(a) to inform and advise the controller or the processor and the employees who carry out processing of their obligations pursuant to this Regulation and to other Union or Member State data protection provisions;
(b) to monitor compliance with this Regulation, with other Union or Member State data protection provisions and with the policies of the controller or processor in relation to the protection of personal data, including the assignment of responsibilities, awareness-raising and training of staff involved in processing operations, and the related audits;
(c) to provide advice where requested as regards the data protection impact assessment and monitor its performance pursuant to Article 35;
(d) to cooperate with the supervisory authority;
(e) to act as the contact point for the supervisory authority on issues relating to processing, including the prior consultation referred to in Article 36, and to consult, where appropriate, with regard to any other matter.
2. The data protection officer shall in the performance of his or her tasks have due regard to the risk associated with processing operations, taking into account the nature, scope, context and purposes of processing.
Hi
I have conducted a Master dissertation in Information Security Frameworks and Standards.
After collecting responses through a Google form questionnaire which is consists of 30 statements, and all of them are based on 5-point Likert Scale. I received 230 responses (cases).
Then I wanted to remove any careless answers which may affect the final result, so by using IBM SPSS I've done the following.
- I used the "Count values within cases" option under the Transform menu, then I assigned the value that I want to count, for instance, 1 = Strongly Agree. I did that for all five values of the Likert scale, so now I have five new variables.
- Then from the Descriptive Statistics, selected Frequencies with the Maximum option and applied to new five variables with the purpose of showing me the cases with the highest repetitive answers. For instance, I found that some of the respondents have 28 neutral responses out of 30 statements, another one with 25 agree out of 30 statements, thus I deleted this kind of answers.
But I'm not sure if this an effective method to handle careless answers.
So now my question is that, is there a better and effective method to identify careless responses in the Likert Scale whether by using Microsoft Excel or IBM SPSS, if yes could you please explain the method?
Another question, is it better to conduct the Internal Reliability (Cronbach Alpha) test before Data Cleaning or after (for instance after removing careless responses or before)?
The same question goes to the Principal Component Analysis or Factor Analysis (even though I know that there is a slight difference between PCA and FA).
I really appreciate your cooperation and consideration.
Thank you.
I want to conduct my research on Information Security. There are a lot of papers out there, but I want to first get insight and the big picture. Does anybody have experience of this type? From where should I start?
Encoding of biometric data to arithmetic for use in cryptography
it can be possible to consider that Information security based on the three notions (Confidentiality, Integrity, Availability) , represent an Information Techlogy Risk Management ? .
mean the studing of the three notions enought in ITRM ?
There are so much certifications on cyber security offered nowadays. What would be a certification that is worth spending on, for a person who just finished their undergraduate studies on Cyber Security?
I would prefer a certification on Information Security Audit and Standards sector.
Thank you!!
Millimeter waves that have a frequency spectrum of 30 GHz - 300 GHz appear as a central technology in fifth generation cellular technology (5G), because of their potential with wide bandwidth to achieve the large throughput required by future networks. Research about mmwave generally uses 28-30 GHz, free-license bands at 60 GHz, and E-bands at 71-76 GHz, 81-86 GHz, and 92–95 GHz.
Papers:
T. Wulandari, D. Perdana and R. M. Negara, "Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service," International Journal of Communication Networks and Information Security (IJCNIS), vol. 10, no. 1, 2018.
R. Ford, M. Zhang, M. Mezzavilla, S. Dutta, S. Rangan and M. Zorzi, "Achieving Ultra-Low Latency in 5G Millimeter Wave Cellular Networks," in IEEE Communications Magazine, vol. 55, no. 3, pp. 196-203, March 2017.
F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta and P. Popovski, "Five disruptive technology directions for 5G," in IEEE Communications Magazine, vol. 52, no. 2, pp. 74-80, February 2014.
S. Rangan, T. S. Rappaport and E. Erkip, "Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges," in Proceedings of the IEEE, vol. 102, no. 3, pp. 366-385, March 2014.
Due to advanced technology there are I merging new challenges affecting information use due to security reasons. More research needs to be done to manage the situation the cyberattacks on systems has increased adversely thus more organisation continue to be exposed thus incurs more risks. What areas of research should we focus on to manage this situation , what are you doing as an expert towards this challenge, where is the starting point for this issue??
Is it possible to predict future security events like, for example, create weather forecast with high accuracy or predict events and trends in other areas? What can be contribution of crowd-sourced security intelligence in this process?
I created Security Predictions experimental web site at http://securitypredictions.xyz. It has been built to harness the ‘wisdom of crowds’. I experiment how we can use crowd-sourced security intelligence to predict future events. You are welcome to contribute there.
We are building a bibliography of InfoSec resources that address work groups, human threat assessment capabilities, and collaboration in InfoSec projects. Also applies to resisting disinformation and malware on social media sites.
Can anyone recommend some good sources of annotated (labeled) datasets for network security tests and Machine Learning (ML)? In general, various cybersecurity areas are welcomed but from reliable and confident sources. Poor and incorrect annotations or malicious sources are not of interest, so avoid it please.
Please guide me to answer the above question. I need to know how can we measure security level???? How can I say this application or system or network is secure or under threat or targeted???
What parameters will be focused during analysis???
Thanks
Keywords: Information security, Network Security, IoT Security, Cyber Security
Today due to the hacking exploits, data security is a major concern for both consumers and companies.
The sheer potential scale of AI’s reach in consumer and IoT applications makes security even more crucial.
From recent study people now are deeply concerned about security (85%) and where their data is stored in the network, be it in edge devices or the cloud.
#AI #Machines #Personal #Information #security #both #consumer #applications #network #cloud #devices
Can you predict what is next big and significant breakthrough in cybersecurity from both perspectives: defending and threats/attacks?
Information security is based on cryptography, steganography or combination of both. Cryptography is used to collapse and lock the meaning conveyed by the secret message by making it understandable only to the users with a specific key to unlock the secret. The steganography and watermarking intentionally make an unintended message visible to all that serves as cover to suppress the guess on the presence of secret behind the medium.
Lightweight encryption schemes designed for crypto applications on resource-constrained embedded devices are known as Light Weight Cryptography (LWC). They are often used for data security in IoT devices.
I am invited to deliver a key note address at an International Conference on Trends in Engineering & Technology on Information Security and Analytics. I have chosen to talk on aspects on Analytics in the context of explosive growth of data triggered by Digitalization. This growth has manifested multitude of opportunities for discovery of new insights gainful to humanity through Analytics. Some of the key facets of Analytics, relevant to the theme of the conference, will be covered in my talk. [refer image attached]
I am keen to hear about MISSING facet or any aspect of Analytics.
Thanking you in advance for your suggestions/inputs/comments.
Regards
Shreekant Shiralkar

I have made SLA based Information Security Metrics for Cloud Computing and desired to simulate on any simulator..
Would you please suggest me appropriate simulator and the way to simulate it
I would love to collect some input from the community.
assume for example a crypto system aim to generate a cipher message with exactly the same size of its plain text and also be stateless to be able to decrypt out of order received packets. Of course this crypto system expose some information about the message attributes however if we sacrifice this level of security but not more, is any crypto system that address such issue?
how we can use multi secret sharing scheme in secure multiparty computation.
Is there any base paper the same.
What are some examples of Multi secret sharing schemes actually being used in real-world applications?
The Zero Trust is fairly new concept in Cyber and Information Security provision that requires proper understanding of organizational policies and technology infrastructure, as well as business application processes. What are the best practices in implementing, managing and monitoring the Zero Trust policies in your organization?
Hi,
The purpose of study is to examine students' perceptions (satisfaction, engagement, convenience, views on learning) and preferences (course, lecture, tutorials and discussions) related to a blended learning course on information security skills (Pilot testing the course before launching in 10 partner institutions).
Perceptions were measured using 5 point scale (SD to SA) and Preferences were measured on a categorical scale (2 to 3 options in each case). In both cases, questionnaire was adapted from a published study.
I have a data set (N=115) of undergrad students from 4 different disciplines and almost equal gender representation. Descriptive Statistics are attached. I have run different tests to see if perceptions and preferences differ among students with different genders, educational background, grades earned in the course, overall cumulative grades. Quite surprisingly none of the student groups showed any significant difference in perceptions and preferences.
I used t-test and ANOVA. Perception variables are highly correlated with one another (Spearman's rho: 0.810 to 0.846) and Preferences are also highly correlated (Spearman's rho: 0.738 to 0.771)
One obvious possible explanation is that students, irrespective of their gender, educational discipline and performance found course satisfactory. However, it seems "too good to be true". And, unfortunately, papers with such results are usually rejected despite the fact it is what data is suggesting.
So, I am here to have your opinion.
Am I missing something or doing something wrong?
Thank you in advance.
BR
Ali
Is there any real time application currently use secret sharing protocol in the industry ?
We already finished a journal article on information security awareness - please see https://www.researchgate.net/publication/308918183_From_Information_Security_Awareness_to_Reasoned_Compliant_Action_Analyzing_Information_Security_Policy_Compliance_in_a_Large_Banking_Organization
However, I would be interested in new approaches on researching awareness also from other research areas.
I just want build my problematic in IT Governance : I want study the relation between IT Governance (ITG) and Information security ( IS)
I am interested in examining the relationship between "organizational trust" and "organizational information security culture". In specific, I would like to examine whether higher level of intra-organizational trust among public sector employees may lead to lesser adoption of "organizational information security culture". Do you know a study which has examined the relationship between the two?
In healthcare, doctors can not decide on what appropriate information (EHRs) is really needed for treatment of a patient case. The amount of information needed by healthcare providers to complete their tasks may vary greatly. The number of medical records a healthcare provider needs to access over a certain period of time depends on many factors, including the number of patients he/she serves, the case he/she working on, and so on. Also, such factors vary among healthcare providers and may change from time to time. It is thus very hard to determine how much risk we should tolerate for a healthcare provider, if a healthcare provider believes knowing more information that is relevant to her patient's conditions enables her to make better decisions. Here, The problems of insiders such as abuse or misuse of privileges granted by authorization services are increased and would be hard to detect .
If we say that, medical records classification is infeasible and requires a great deal of effort and skills to accomplish. How can we assess the risk if the medical records are not classified and we do not know who should access what? ???
Polymorphic generators can be used in software, to make self-modifying code (to prevent unauthorized copying of executable code).
Are there any ways to implement this mechanism for preventing unauthorized copying of some data from hard disk or RAM? E.g. I have a license.txt and I don’t want anyone to get copy of this file from my storage. So when intruder copies this file, he’ll get a fully changed copy of this file.
Can someone suggest any literature related (papers/documents)? It would be very much appreciated.
Best regards,
I would like to know about the encryption systems used in SMS coding (both for the purpose of transmission data security) in mobile modern phones.
I need a concise and clear focused solution for it.
Digital image authentication being an important necessity, can you please update what are the different tools/ applications available for this purpose? Authentica seems to be one such tool. Any other such tools?? Newspaper paper agencies / electronics media certainly will be making use of some tools to authenticate photographs received from sources. Anybody have any idea regarding those software?
Thanks in advance to all for your valuable input
Priyadarsini
Algorithm in attached file.
algorithm in Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration paper.
Is PCA a suitable mechanism for fingerprint recognition?
Is minutiae based mechanism prefered over PCA for fingerprint recognition?
I'm looking for a good reference to game theory and its applications in cryptography and information security
symmetric key cipher (block or stream cipher) providing partial decryption of data at some points. Although the entire data is not been decrypted but the data decrypted to that specific point should be viewed or accessed.
The partial decryption keys can be inherited form the main symmetric key to do partial decryptions successfully.
Can anyone refer to me any good stuff or papers worked out in this area?

Hello,
I am trying to find different case studies that could be used for learnng different information security and privacy (IS&P) concepts, issues, approaches to deal with different IS&P threats. Although I am more interested in case studies focused on human element in information security, however, case studies focusing other aspects of IS&P are also of interest.
In some cases, "scenarios" and "case-based learning" are also used for this kind of teaching or learning.
I myself am searching but if someone already is aware of some resources, it will be really helpful.
Thanks,
Ali
We all or some of us have an idea of the capabilities of Zeus which is still commercial as we speak. Zeus has managed to steal a lot of millions of $$ and a pretty good amount of personal information through the herders. Why is the pace of stopping Zeus or take down so slow? I know the binaries keep changing each day. Nevertheless, can we attribute that the anti-forensics techniques are still far much ahead of the available digital forensic tools?Other than EnCase and other major FTKs, what can stop this mess once and for all?
Does single or dual-n-back training have any lasting, transferable effects on other cognitive skills, apart from improving the performance in running the dual-n-back game? Some research studies indicate that it may have some effect for some people with some conditions (e.g. older people, people with dysphoria etc.), however larger meta-studies indicate no or very small effect in general as well as methodological problems in the underlying studies. The research therefore seems inconclusive.
What is your research experience with this? Are there any groups or conditions where such training has been shown to have transferable, lasting effects?
[**********This is an outdated post*************]
Dear fellows,
I am conducting a study to explore students' perceived information security and privacy (IS&P) threats landscape. For this purpose I have designed a survey and uploaded it at the following link:
The survey targets university students (undergraduate/postgraduate/PhD). It will take 15-20 minutes to fill in the survey.
It will be really appreciated if you could help me in getting response for this survey by:
1. filling in the survey and share with your friends, if you are a student
2. sharing it among your students, if you are a faculty member
The survey doesn't have any restriction, so ANY university student from ANY university from ANY where in the world can fill this survey.A large response set is crucial for this study.
Thanking in anticipation.
Best,
Ali Farooq
Doctoral Student
University of Turku, Finland
Identifying assets is the primary, and most critical step in threat modeling, because assets are essentially threat targets.
So, How we could determine that the list of assets is complete and be sure that we have not overlooked relevant assets?
Any thoughts about the need for and possibility of creating a complete IS Theory as a basic science?
I would like to know the impact on both sides: people's privacy and government security.
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point.
Can it be done in case of WPA2 encrypted networks too, i mean the complete four way handshaking involved during authentication?
Suppose we have a set of API hosted on a local server. I only want legal remote programs to invoke those APIs. If the remote program is, let's say the original program that I uploaded to the remote machine, then I allow the invoke. If the remote program is a version tampered by the attacker, then I disallow it. How can I bind the program's identity to the function invocation to determine whether the remote program is not tampered?
Hey all
I am providing the scope of ISMS for an organization who has contract with us. We are going to test the feasibility before implementing ISMS. Does anyone have any idea about such an issue?
Thank you so much.
Regarding to Basel II Pillar 2, they spelled out that bank should notice other inherent risk such as compliance, reputation, legal and strategic risk. These are qualitative (as far as I know, except there is a way to quantify them).
I was thinking about Fuzzy Inference System, but looking at the high dynamic economic condition, this method is no longer applicable or not proper enough to cover the possibilities.
Any answer and discussion are welcome, it will be my pleasure to catch your answer/ideas.
Regards.
There are several Information Security frameworks, standards, certifications and guides to maintain security in an organization.
Would you share which one is best for said purpose?